CVE-2025-70161
Published: 09 January 2026
Description
EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName…
more
field, allowing arbitrary code execution.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validating information inputs like the pppUserName field at web interfaces to prevent command injection by ensuring proper sanitization before passing to system() calls.
SI-2 mandates identifying, documenting, and remediating flaws such as the unsanitized pppUserName handling in the Web-setWAN handler to eliminate the command injection vulnerability.
RA-5 requires vulnerability scanning that would identify the command injection vulnerability in the router firmware and trigger remediation actions.
Security SummaryAI
CVE-2025-70161, published on 2026-01-09, is a command injection vulnerability (CWE-77) affecting the EDIMAX BR-6208AC V2_1.02 router firmware. The issue stems from the pppUserName field being directly passed to a shell command via the system() function in the Web-setWAN handler without proper sanitization, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction by injecting malicious commands into the pppUserName field during WAN configuration attempts. Successful exploitation enables arbitrary code execution on the affected device, potentially granting full control over the router.
Mitigation details are available in the advisory published at https://tzh00203.notion.site/EDIMAX-BR-6208AC-V2_1-02-Command-Injection-Vulnerability-in-Web-setWAN-handler-2d3b5c52018a80d7ae8dce2bf5e3294c?source=copy_link.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote command injection via public-facing web WAN configuration handler enables exploitation of public-facing application (T1190) and arbitrary Unix shell command execution (T1059.004).